Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Access control“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Access control" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Access control"
Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Der volle Inhalt der QuelleSaunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Der volle Inhalt der QuelleAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Der volle Inhalt der QuellePenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Der volle Inhalt der QuelleSchuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (2011): 693. http://dx.doi.org/10.1038/nrm3220.
Der volle Inhalt der QuelleSubramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Der volle Inhalt der QuelleFriedman, Michael. "Access-control software." Computers & Security 7, no. 5 (1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Der volle Inhalt der QuelleCollinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Der volle Inhalt der QuelleYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Der volle Inhalt der QuelleIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Der volle Inhalt der QuelleDissertationen zum Thema "Access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Der volle Inhalt der QuelleAtkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Der volle Inhalt der QuelleMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Der volle Inhalt der Quellede, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.
Der volle Inhalt der QuelleHoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Der volle Inhalt der QuelleMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Der volle Inhalt der QuelleMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Der volle Inhalt der QuelleSchmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.
Der volle Inhalt der QuelleKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Der volle Inhalt der QuelleLukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.
Der volle Inhalt der QuelleBücher zum Thema "Access control"
Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Key Note, 2005.
Den vollen Inhalt der Quelle findenEmily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Key Note, 2002.
Den vollen Inhalt der Quelle findenJane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Key Note, 2004.
Den vollen Inhalt der Quelle findenDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Key Note, 1999.
Den vollen Inhalt der Quelle findenLarson, Jessica Megan. Snowflake Access Control. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Der volle Inhalt der QuelleFerraiolo, David. Role-based access control. 2nd ed. Artech House, 2007.
Den vollen Inhalt der Quelle findenHoppenstand, Gregory S. Secure access control with high access precision. Naval Postgraduate School, 1988.
Den vollen Inhalt der Quelle findenKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Der volle Inhalt der QuelleBoonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Der volle Inhalt der QuelleMike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. Jordan, 1988.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Access control"
Malik, Waqar. "Access Control." In Learn Swift 2 on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_19.
Der volle Inhalt der Quellede Villiers, Sidriaan. "Access Control." In The Cyber Risk Handbook. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch22.
Der volle Inhalt der QuelleYao, Jiewen, and Vincent Zimmer. "Access Control." In Building Secure Firmware. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_10.
Der volle Inhalt der QuelleMalik, Waqar. "Access Control." In Learn Swift on the Mac. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_11.
Der volle Inhalt der QuelleFerrari, Elena. "Access Control." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_6-3.
Der volle Inhalt der QuelleYang, Kan. "Access Control." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_289.
Der volle Inhalt der QuelleFerrari, Elena. "Access Control." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_6.
Der volle Inhalt der QuellePieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Access Control." In Fundamentals of Computer Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_17.
Der volle Inhalt der QuelleShekhar, Shashi, and Hui Xiong. "Access Control." In Encyclopedia of GIS. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_14.
Der volle Inhalt der QuelleYang, Kan. "Access Control." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_289-1.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Access control"
Naveena, Kolli, M. Suleman Basha, Chanda Sai Sathvik, Tadikamalla Revanth Mahajan, and Polepaka Nithin Emmanuel. "Enhancing Access Control in Cloud Storage through Sanitizable Access Control System." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD). IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00042.
Der volle Inhalt der QuelleBarker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.
Der volle Inhalt der QuelleJaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.
Der volle Inhalt der QuelleOsborn, Sylvia. "Mandatory access control and role-based access control revisited." In the second ACM workshop. ACM Press, 1997. http://dx.doi.org/10.1145/266741.266751.
Der volle Inhalt der QuelleSwaminathan, Kishore. "Negotiated Access Control." In 1985 IEEE Symposium on Security and Privacy. IEEE, 1985. http://dx.doi.org/10.1109/sp.1985.10019.
Der volle Inhalt der QuelleLawson, Curt, and Feng Zhu. "Sentential access control." In the 50th Annual Southeast Regional Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2184512.2184582.
Der volle Inhalt der QuelleGehani, Ashish, and Surendar Chandra. "Parameterized access control." In the 4th international conference. ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460922.
Der volle Inhalt der QuelleNaldurg, Prasad, and Roy H. Campbell. "Dynamic access control." In the eighth ACM symposium. ACM Press, 2003. http://dx.doi.org/10.1145/775412.775442.
Der volle Inhalt der QuelleCautis, Bogdan. "Distributed access control." In the 12th ACM symposium. ACM Press, 2007. http://dx.doi.org/10.1145/1266840.1266850.
Der volle Inhalt der QuelleArnab, Alapan, and Andrew Hutchison. "Persistent access control." In the 2007 ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314286.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Access control"
Gartmann, Rüdiger, and Bastian Schäffer, eds. License-Based Access Control. Open Geospatial Consortium, Inc., 2011. http://dx.doi.org/10.62973/11-018.
Der volle Inhalt der QuelleStokes, E., D. Byrne, B. Blakley, and P. Behera. Access Control Requirements for LDAP. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2820.
Der volle Inhalt der QuelleTreado, Stephen J., Steven C. Cook, and Michael Galler. Distributed biometric access control testbed. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7190.
Der volle Inhalt der QuelleHu, Vincent C., David F. Ferraiolo, and D. Rick Kuhn. Assessment of access control systems. National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.ir.7316.
Der volle Inhalt der QuelleQuirolgico, Stephen, Vincent Hu, and Tom Karygiannis. Access control for SAR systems. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7815.
Der volle Inhalt der QuelleBierman, A., and M. Bjorklund. Network Configuration Access Control Model. RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8341.
Der volle Inhalt der QuelleKoskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1763279.
Der volle Inhalt der QuelleHu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.ir.8403-draft.
Der volle Inhalt der QuelleHu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8403.
Der volle Inhalt der QuelleHu, Vincent C. Access Control for NoSQL Databases. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8504.ipd.
Der volle Inhalt der Quelle